Listar LCC - Contribuciones a congresos científicos por tipo "info:eu-repo/semantics/acceptedVersion"
Mostrando ítems 1-8 de 8
-
A Cost-efficient Approach to Building in Continuous Integration.
(Association for Computing Machinery (ACM), 2020)Continuous integration (CI) is a widely used practice in modern software engineering. Unfortunately, it is also an expensive practice — Google and Mozilla estimate their CI systems in millions of dollars. In this paper, ... -
Decomposing the Rationale of Code Commits: The Software Developer’s Perspective.
(Association for Computing Machinery (ACM), 2019)Communicating the rationale behind decisions is essential for the success of software engineering projects. In particular, understanding the rationale of code commits is an important and often difficult task. We posit that ... -
Enhanced Cellular Detection Using Convolutional Neural Networks and Sliding Window Super-Resolution Inference.
(Springer, 2024)Histopathology currently serves as the standard for breast cancer diagnosis, but its manual execution demands time and expertise from pathologists. Artificial intelligence, particularly in digital pathology, has made ... -
From SMOG to Fog: A security perspective.
(IEEE, 2017)Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low latency. ... -
GDI as an alternative guiding interaction style for occasional users.
(Springer Nature, 2019-08-23)It is usually taken for granted that Direct Manipulation is the best interaction style for inexperienced or non-expert users; moreover, this style of interaction is generally considered the best for almost every situation ... -
History Slicing: Assisting Code-Evolution Tasks.
(Association for Computing Machinery (ACM), 2012)Many software-engineering tasks require developers to understand the history and evolution of source code. However, today’s software-development techniques and tools are not well suited for the easy and efficient procurement ... -
Prediction of Optimal Locations for 5G Base Stations in Urban Environments Using Neural Networks and Satellite Image Analysis.
(Springer, 2024)Deploying 5G networks in urban areas is crucial for meeting the increasing demand for high-speed, low-latency wireless communications. However, the complex topography and diverse building structures in urban environments ... -
Runtime enforcement of dynamic security policies.
(Springer Nature, 2014-08)The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ...